Friday, 6 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > DEF CON research takes aim at ZTNA, calls it a bust
Global Market

DEF CON research takes aim at ZTNA, calls it a bust

Last updated: August 18, 2025 6:45 am
Published August 18, 2025
Share
Shutterstock
SHARE

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Verify Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained essentially the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from an identical however extra basic bypass. The enrollment API required no authentication, permitting attackers to register gadgets utilizing solely leaked group keys and legitimate electronic mail addresses. 

Verify Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Internet Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to help.

Credential storage and token administration flaws

All three distributors applied weak credential storage mechanisms. Zscaler saved Machine Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses different considerably in velocity and effectiveness. In line with the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was applied.

See also  How to identify a sustainable data centre 

Source link

TAGGED: Aim, bust, calls, Con, Def, Research, Takes, ZTNA
Share This Article
Twitter Email Copy Link Print
Previous Article Salesforce's new CoAct-1 write their own code to accomplish tasks Salesforce’s new CoAct-1 write their own code to accomplish tasks
Next Article The evolution of data center semiconductors: Navigating the AI revolution The evolution of data center semiconductors: Navigating the AI revolution
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

A new era for intelligent agents and AI coding

Anthropic has unveiled its newest Claude 4 mannequin household, and it’s wanting like a leap…

May 22, 2025

How to Navigate Data Center Audits

Dealing with audits will not be probably the most thrilling a part of operating a…

November 10, 2025

Crossbeam and Reveal Merge

Crossbeam, a Philadelphia, PA-based Ecosystem-Led Progress platform, is to mix with Reveal, a Paris, France-based Nearbound Income…

June 27, 2024

Chckvet Raises Pre-Seed Funding

Chckvet, a Baton Rouge, LA-based supplier of built-in on-line scheduling, consumer communication, and analytics software…

June 5, 2025

How AI has already changed coding forever

Final week MongoDB CEO Dev Ittycheria likened present-day AI to the “dial-up section of the web…

March 13, 2024

You Might Also Like

URL HTTP Web Address
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

By saad
Can data centres scale AI without putting water under pressure?
Global Market

Can data centres scale AI without putting water under pressure?

By saad
Cisco building exterior with sign
Global Market

Cisco issues emergency patches for critical firewall vulnerabilities

By saad
Steel joints. Mounting bolted connection of steel beams before welding. Metal construction covered protective gray primer. Close-up.
Global Market

Data center new builds diminish even as demand rises

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.